General

  • Target

    FloorDivision.luau

  • Size

    101B

  • Sample

    240521-ze5z7ahg4s

  • MD5

    a86589afb1c3e7a84e089abcd70c836e

  • SHA1

    5caeeea4474bac84f7490477491e3903968359a6

  • SHA256

    4f46e7ff197b63e7c809f4def8722cb33a1244e48453e46af4fce77545e3ba04

  • SHA512

    df8c67d030165b694f2a3bfc88d758f37752a0db4d91366c6d73dd5063ed61e45b96fdd478142cb37b32e78066ed17fbd35a046b2d2842b9a95988600d67edf5

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/lem61111111111/raw

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://bitbucket.org/j46j746/hg56h56h56h/raw/7db2d3da302e81e3311c7814241af0d59152a170/lem.rar

Extracted

Family

redline

C2

45.15.156.142:33597

Targets

    • Target

      FloorDivision.luau

    • Size

      101B

    • MD5

      a86589afb1c3e7a84e089abcd70c836e

    • SHA1

      5caeeea4474bac84f7490477491e3903968359a6

    • SHA256

      4f46e7ff197b63e7c809f4def8722cb33a1244e48453e46af4fce77545e3ba04

    • SHA512

      df8c67d030165b694f2a3bfc88d758f37752a0db4d91366c6d73dd5063ed61e45b96fdd478142cb37b32e78066ed17fbd35a046b2d2842b9a95988600d67edf5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks